Classical ciphers

Rail fence cipher

The rail fence cipher (also called a zigzag cipher) is a classical type of transposition cipher. It derives its name from the manner in which encryption is performed, in analogy to a fence built with horizontal rails. (Wikipedia).

Rail fence cipher
Video thumbnail

Symmetric Key Cryptography: The Rail Fence Cipher

This is the third in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers a transposition cipher called the rail fence cipher, also known as the zig zag cipher. It explains how this method can be used to scramble the letters in a pl

From playlist Cryptography

Video thumbnail

Pseudorandom Number Generation and Stream Ciphers

Fundamental concepts of Pseudorandom Number Generation are discussed. Pseudorandom Number Generation using a Block Cipher is explained. Stream Cipher & RC4 are presented.

From playlist Network Security

Video thumbnail

Block Ciphers and Data Encryption Standard (DES) - Part 1

Fundamental concepts of Block Cipher Design Principles are discussed. DES is presented. Differential and linear cryptanalysis are explained . Block Cipher Principles Data Encryption Standard (DES) Differential and Linear Cryptanalysis Block Cipher Design Principles

From playlist Network Security

Video thumbnail

The Art and Science of Secret Messages: Some Glimpses (ONLINE) by Geetha Venkataraman

KAAPI WITH KURIOSITY THE ART AND SCIENCE OF SECRET MESSAGES: SOME GLIMPSES (ONLINE) SPEAKER: Geetha Venkataraman (Dr. B. R. Ambedkar University Delhi, Delhi) WHEN: 4:00 pm to 5:30 pm Sunday, 19 September 2021 WHERE: Livestream via the ICTS YouTube channel Abstract:- In the modern worl

From playlist Kaapi With Kuriosity (A Monthly Public Lecture Series)

Video thumbnail

Block Ciphers and Data Encryption Standard (DES): Part 2

Fundamental concepts of Block Cipher Design Principles are discussed. Differential cryptanalysis and linear cryptanalysis are explained.

From playlist Network Security

Video thumbnail

Symmetric Key Cryptography: Cryptographic Techniques

This is the fifth in a series about cryptography; an extremely important aspect of computer science and cyber security. It reviews how the XOR logical operation can be used to encrypt at the bit level in symmetric key cryptography, then shows how this can be combined with permutation step

From playlist Cryptography

Video thumbnail

Transport Layer Security: Part 2 - TLS & HTTPS

Fundamental concepts of TLS are discussed. SSL is analyzed. HTTPS & SSH are presented.

From playlist Network Security

Video thumbnail

Transport Layer Security: Part 1

Fundamental concepts of TLS are discussed. SSL is analyzed. HTTPS & SSH are presented.

From playlist Network Security

Video thumbnail

Doggie Aggression (Full Episode) | Cesar Millan: Better Human, Better Dog

Cesar intervenes when dog brothers draw blood - a Doberman who continuously causes fights with his packmate and a Jindo-Pit Mix that’s a nervous wreck. ➡ Subscribe: http://bit.ly/NatGeoWILDSubscribe ➡ Get more Nat Geo Wild Full Episodes: https://youtu.be/qAG2SkTPltw ➡ Get more Nat Geo Ful

From playlist Cesar Millan | National Geographic

Video thumbnail

RailsConf 2018: Encrypted Credentials on Rails 5.2: Secrets to Success by Christopher Rigor

RailsConf 2018: Encrypted Credentials on Rails 5.2: Secrets to Success by Christopher Rigor Secrets are out. Credentials are in. This new Rails 5.2 feature offers a number of advantages over the old way of managing secrets. You get atomic deploys, you avoid putting sensitive data on envir

From playlist RailsConf 2018

Video thumbnail

DEFCON 19: Steganography and Cryptography 101

Speaker: eskimo There are a lot of great ways to hide your data from prying eyes this talk will give a crash course in the technology and some tools that can be used to secure your data. Will also discuss hiding your files in plain site so an intruder will have no idea that hidden files

From playlist DEFCON 19

Video thumbnail

Linear Codes Introduction

This video is a brief introduction to linear codes: dimensions, G (generating matrix), H (parity check matrix), their forms. Also gives an example of how to convert between G and H. Here is the formal definition of a Linear Code: A linear code of dimension k and length n over a field

From playlist Cryptography and Coding Theory

Video thumbnail

Kaggle Coffee Chat: Phil Culliton | Kaggle

Kaggle Coffee Chats are casual peer-to-peer conversations with Kaggle Data Scientists. Our first conversation is with Walter Reade, also know as inversion. We talk about upcoming competitions, exciting new methods in data science and our favorite caffeinated beverages. SUBSCRIBE: http://w

From playlist Kaggle Coffee Chat | Kaggle

Video thumbnail

Intrusion Detection: Part 2

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

I know Kung Fu! (or neo4j on Rails without jRuby)

"Reality is a graph, embrace it!" Sure graph databases are really cool and have a timestamp dated next week, but do you know when you should actually use one? Sometimes living on the bleeding edge pays off and in this talk, I'll show you how you can simplify your application and model your

From playlist Cascadia Ruby 2012

Video thumbnail

RailsConf 2019 - Modern Cryptography for the Absolute Beginner by Jeffrey Cohen

RailsConf 2019 - Modern Cryptography for the Absolute Beginner by Jeffrey Cohen _______________________________________________________________________________________________ Cloud 66 - Pain Free Rails Deployments Cloud 66 for Rails acts like your in-house DevOps team to build, deploy and

From playlist RailsConf 2019

Video thumbnail

PCB Wall

What to do with all those old PCBs from stuff you've taken apart...

From playlist Projects & Installations

Video thumbnail

Securing Your Site by Thomas Pomfret

Rails makes it very easy to rapidly develop web applications, but doesn't always make it so simple to deploy or secure them. This talk is going to focus on best practices to secure your rails application, learnt through multiple high profile projects and penetration tests. The talk will b

From playlist Rails Conf 2012

Related pages

Transposition cipher | Classical cipher | Scytale | Brute-force attack | Helen Fouché Gaines